- Published on
Security
- Published on
Tabnabbing attacks enable a malicious website to suddenly redirect a legitimate page to the attacker's page. They can be an effective tool in phishing attacks, so let's see how you as the developer can safeguard your users from the attack.- Published on
In this article, you will learn about clickjacking attacks, how they work, how they can put your website users at risk, and how you can prevent it.- Published on
Learn everything about the fetch metadata headers and how you can implement isolation policies to defend against various client-side attacks.- Published on
Learn how man-in-the-middle attacks can put your website users in danger and how to prevent it.- Published on
- Published on
Never be frustrated with CORS again. Learn what cross-origin resource sharing is, why it exists, and how to embrace it.- Published on
Learn why HTTPS is not enough to protect your website from network attacks and how the HSTS header comes in to solve the problem.- Published on
Learn about what the Same Origin Policy (SOP) is, and what it means for you, as a web developer.- Published on
Learn how SameSite cookies work and how they can protect against CSRF, XSS, XS-Leaks, and other vulnerabilities.- Published on
Are you leaking your users' sensitive data to malicious websites? Learn how xs-leaks work and how to prevent it in 7 steps.- Published on
An explanation of CSRF (Cross-Site Request Forgery) vulnerabilities and practical steps for avoiding them.- Published on
An explanation of XXE (XML External Entity) vulnerabilities and practical steps for avoiding them.- Published on
An in-depth explanation of SQL injection vulnerabilities and practical steps for avoiding them.- Published on
- Published on
An in-depth explanation of XSS (Cross-Site Scripting) vulnerabilities and practical steps for avoiding them.